2008 1st International Conference on Information Technology最新文献

筛选
英文 中文
Control model for networked embedded applications 网络嵌入式应用的控制模型
2008 1st International Conference on Information Technology Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621601
O. Koné
{"title":"Control model for networked embedded applications","authors":"O. Koné","doi":"10.1109/INFTECH.2008.4621601","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621601","url":null,"abstract":"We deal with the problem of safe operation guarantee in networked embedded application by avoiding dysfunctionings caused by unexpected behaviour of connected components. We use a behaviour based control mechanism to fix the desired operations of the application. The paper proposes a generic control model which can be customized for various applications profiles without modifying the underlying network bearer.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133176770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The role and construction of educational agents in distance learning environments 远程学习环境中教育主体的角色与建构
2008 1st International Conference on Information Technology Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621650
A. Landowska
{"title":"The role and construction of educational agents in distance learning environments","authors":"A. Landowska","doi":"10.1109/INFTECH.2008.4621650","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621650","url":null,"abstract":"An educational agent is an intelligent and autonomous part of a learning environment introduced in order to assist a student or a teacher in the completion of their tasks. An agent can also autonomously perform tasks related with the management of learning resources or the achievement of internal educational goals. This paper presents the definition and classification of educational agents together with their tasks and roles in the educational process. In distance learning environment, agents can improve the motivation and concentration of the students and, consequently, they can improve the effectiveness of the educational process. Agent characteristics and architecture required to achieve educational goals are also described. The paper presents also a prototypical implementation of an educational agent (called the WAS agent) that is developed as a part of our research.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129508327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Information security in the LRIT system LRIT系统中的信息安全
2008 1st International Conference on Information Technology Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621700
R. Niski, Marcin Waraksa, J. Zurek
{"title":"Information security in the LRIT system","authors":"R. Niski, Marcin Waraksa, J. Zurek","doi":"10.1109/INFTECH.2008.4621700","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621700","url":null,"abstract":"LRIT (long range identification and tracking of ships) system is close to its implementation and the LRIT information (identification and position of the vessels) is very sensitive. In this paper the structure of system data bases and communication links in the LRIT system are presented. In this context, a security of the LRIT information will be analyzed, moreover cryptographic mechanisms in the LRIT links on-land will be described. Network security issues and mechanisms ldquoas isrdquo will not be described here - they are widely described in available literature. As for now there is no any recommendation in the LRIT standard documentation concerning information protection in the LRIT radio links. In the paper a proposal of cryptographic system for the LRIT radio links will be presented.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128686346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficiency of new method of removing the noisy background from the sequence of MRI scans depending on structuring elements used to morphological processing 基于形态学处理结构元素的MRI扫描序列噪声背景去除新方法的效率
2008 1st International Conference on Information Technology Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621682
R. Kalicka, A. Pietrenko‐Dabrowska, S. Lipiński
{"title":"Efficiency of new method of removing the noisy background from the sequence of MRI scans depending on structuring elements used to morphological processing","authors":"R. Kalicka, A. Pietrenko‐Dabrowska, S. Lipiński","doi":"10.1109/INFTECH.2008.4621682","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621682","url":null,"abstract":"The paper presents a new method of removing the noisy background from the sequence of magnetic resonance imaging (MRI) scans. The scans contain the noisy head-cross data and also the noisy background data. The latter have to be removed and excluded from a further analysis. It is achieved by applying some basic morphological operations of dilation, erosion, opening and closing to the previously binarized MRI scans. The results of removing the background from the sequence of scans with the use of some different shapes and sizes of structuring elements are presented in the paper. The aim of this paper is to choose the best structuring elements to make the new method the most immune to various qualities and appearances of the processed MRI images.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122453402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
How does ethernet work on freescale MPC8555E embedded platform with FreeBSD system? 以太网如何在飞思卡尔MPC8555E嵌入式平台与FreeBSD系统上工作?
2008 1st International Conference on Information Technology Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621606
P. Kruszynski, S. Sobieski
{"title":"How does ethernet work on freescale MPC8555E embedded platform with FreeBSD system?","authors":"P. Kruszynski, S. Sobieski","doi":"10.1109/INFTECH.2008.4621606","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621606","url":null,"abstract":"The main purpose of this paper is to provide the reader with some insight into how Ethernet controller works on MPC8555E embedded platform produced by Freescale company. The paper will deal with the problems connected with Ethernet performance during power-up of computer when firmware is running on the hardware and later when FreeBSD loader works. Another problem which will be described is network controller management that is provided by FreeBSD kernel. The last part will mention some differences between firmware (pooling) and kernel network implementation (interrupt).","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121417757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic content segmentation of audio recordings at multidisciplinary medical team meetings 多学科医疗团队会议音频记录的自动内容分割
2008 1st International Conference on Information Technology Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621647
Jing Su, B. Kane, S. Luz
{"title":"Automatic content segmentation of audio recordings at multidisciplinary medical team meetings","authors":"Jing Su, B. Kane, S. Luz","doi":"10.1109/INFTECH.2008.4621647","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621647","url":null,"abstract":"A single recording of a multidisciplinary medical team meeting (MDTM) can be expected to contain several separate discussions on different patients. Automatic speaker segmentation alone does not allow for the separation of individual patient case discussions (PCDs). A novel method is presented here, based on Hidden Markov Models (HMM), to segment audio recordings of MDTMs and facilitate the non-linear retrieval of individual PCDs. The method combines professional role interaction with speaker vocalization patterns. The sequence and duration of vocalization and speakerspsila roles are used as training states. Results demonstrate HMM segmentation to have good potential in the development of an MDTM browser. The approach outlined here can be applied in a wide range of meetings.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115062895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Dynamic composition of behavior-rich VR content 动态合成行为丰富的VR内容
2008 1st International Conference on Information Technology Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621653
K. Walczak
{"title":"Dynamic composition of behavior-rich VR content","authors":"K. Walczak","doi":"10.1109/INFTECH.2008.4621653","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621653","url":null,"abstract":"A novel approach to modeling and dynamic composition of behavior-rich interactive VR content is presented. The approach, called Beh-VR, enables dynamic generation of virtual scenes from arbitrarily selected sets of specifically designed reusable virtual objects, called VR-Beans. Presentation and behavior of the objects in virtual scenes is determined by associated scripts encoded in a high-level language called VR-BML. VR-Beans are compatible with existing scene description standards such as VRML/X3D, but are designed according to specific rules enabling the use of these objects in dynamically generated scenes. Further, to simplify the design of complex interactive VR scenes, VR content patterns are used.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115154082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hardware accelerated implementation of wavelet transform for machine vision in road traffic monitoring system 小波变换在道路交通监控系统中的硬件加速实现
2008 1st International Conference on Information Technology Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621686
M. Kłosowski
{"title":"Hardware accelerated implementation of wavelet transform for machine vision in road traffic monitoring system","authors":"M. Kłosowski","doi":"10.1109/INFTECH.2008.4621686","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621686","url":null,"abstract":"A system for road traffic monitoring has been described. This machine vision system is using small and cheap camera and FPGA postprocessor with wireless network interface. Power for the system will be delivered from solar panels and therefore the system is optimized to be power efficient. In this paper the machine vision traffic jam detection module based on wavelet transform is described. This module correctly detects and measures traffic jams or very slow traffic conditions when background subtraction algorithms (used for vehicle counting) are not suitable. Optical flow algorithms can also be used but they are computationally expensive. Sample discrete wavelet transform based algorithm and its hardware implementation in FPGA are examined in the paper. Hardware accelerated discrete wavelet transform can be also applied to image compression when image has to be transferred to the traffic control center (picture quality and frame rate depends on wireless network quality). Results of sample traffic classification are presented and compared. This work has been supported by the Polish Ministry of Science and Higher Education under R&D grant no. R02 014 01 from the Science Budget 2007-2008.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114420378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An analysis and extension of top-k spatial preference queries optimization methods top-k空间偏好查询优化方法的分析与推广
2008 1st International Conference on Information Technology Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621629
M. Gorawski, K. Dowlaszewicz
{"title":"An analysis and extension of top-k spatial preference queries optimization methods","authors":"M. Gorawski, K. Dowlaszewicz","doi":"10.1109/INFTECH.2008.4621629","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621629","url":null,"abstract":"The paper presents a general overview of top-k spatial preference queries and their R-tree based optimization methods. It also proposes a modification of top-k spatial preference query description and a new optimization technique. Moreover, the paper presents an analysis of query definition influence on the process of its execution using algorithms which utilize different combinations of optimization methods. An analogous analysis of data character influence is also presented.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121545139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data processing in the intOLAP system intOLAP系统中的数据处理
2008 1st International Conference on Information Technology Pub Date : 2008-05-18 DOI: 10.1109/INFTECH.2008.4621587
M. Gorawski, S. Bankowski
{"title":"Data processing in the intOLAP system","authors":"M. Gorawski, S. Bankowski","doi":"10.1109/INFTECH.2008.4621587","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621587","url":null,"abstract":"Reporting systems are important part in the software creating and customization process. Presenting information in a form of legible and user-friendly report is a basis for business decisions support. In OLAP systems, these actions have to be performed on-line what results in strict requirements regarding system's reliability and efficiency. The more complex the data warehouse the higher the costs of reports designing and maintaining process. Recently we can observe that data warehouse engine does not fit all clients tools - such problems can be resolved with different platforms integration. The framework presented in the paper supports creation of OLAP class interoperate reporting system with regards of the ETL process.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133646669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信